IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed   
Managing Security Reports
 
How Okta and Netskope Delivered on BMC's Cloud Security Strategy
sponsored by Okta + Netspoke
CASE STUDY: In this blog post, Joel Bruesch, Sr. Director of Cybersecurity at BMC Software, overviews key security challenges he’s seen in his leadership role and highlights how BMC partnered with Okta and Netskope to build an identity-first cloud security.
Posted: 29 May 2020 | Published: 21 Jun 2019

Okta + Netspoke

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

How to Choose a SOC 2 Auditor: 6 Questions to Ask
sponsored by Ostendio
RESOURCE: For organizations looking to conduct a SOC 2 audit, choosing the right external audit firm can be a daunting, yet crucial, process. To make sure you choose the right partner, this article highlights 6 questions to consider during the selection process. Read on to find out what they are.
Posted: 04 Jun 2020 | Published: 27 Sep 2019

Ostendio

The Future Is the Web! How to Keep It Secure?
sponsored by Acunetix
WHITE PAPER: As organizations and their environments grow increasingly complex, so too do the threats that they face. Web security has never been more critical, and cybersecurity skills gap has never been greater – so how can organizations keep their environments secure? Download this white paper to find out.
Posted: 27 May 2020 | Published: 27 May 2020

Acunetix

DAST vs SAST: A Case for Dynamic Application Security Testing
sponsored by Acunetix
RESOURCE: When it comes to performing a security test for business applications, most security teams have a preference: DAST or SAST. However, both play a key role in effective security testing strategies. Read this article to learn more about the strengths of implementing the DAST method, and how to address its weaknesses.
Posted: 28 May 2020 | Published: 06 Mar 2020

Acunetix

Automating Your Vulnerability Remediation Process
sponsored by Vulcan
WHITE PAPER: The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.
Posted: 15 May 2020 | Published: 30 Jun 2019

Vulcan

Blueprint: Modern Layered Security
sponsored by SonicWall
WHITE PAPER: The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Redefining Security Analytics with Chronicle
sponsored by Chronicle
WHITE PAPER: Historically, most analysis and complex detection capabilities have been bundled together into a technology called a “SIEM.” In this Google Cloud Whitepaper, take an in-depth look at Chronicle’s global security telemetry platform, designed as the answer to the question: What would SIEM look like if it were invented today?
Posted: 19 May 2020 | Published: 19 May 2020

Chronicle

This Is Why Security Matters
sponsored by HP Inc
WHITE PAPER: There are a myriad of risks presented to enterprise computer users, and these risks have multiplied during the current lockdown. Check out this resource to learn how HP leverages Intel and AMD features to combat security threats, why they endorse Windows 10 for their hardware, and what steps they themselves are taking to protect users.
Posted: 27 May 2020 | Published: 27 May 2020

HP Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info